cite all sources used for the assignment, as well as a complete list of reference

Presenting the Data Threat, criticality, and vulnerability are the meat of risk assessment. However, the process doesn’t stop there. Risk management includes the implementation of procedures and policies in order to protect assets from risk. To accomplish this, risk assessors must present a valid, orderly critique and recommendations to the intended audience. Submission Details: By , in a minimum of 300 words, post to the your response to the following point: : Be sure to cite all sources used for the assignment, as well as a complete list of reference at the end of your post. Remember, you cannot have only in-text citations or only references. You must have both. By , read and respond to at least two of your classmates’ posts. Determine whether you agree or not with the recommended actions. If you do, why? If you don’t, why not and what would you do differently?